ARTICLES

Why the Drones are Clear and Present Danger & Cybersecurity Concern

The increase usage of cybercriminals using drones as a part of their cyber-attacks is a clear and present danger. Read on to know more... Gone...

Impact of Cyberattacks on SMBs in US from Past Year

According to a recent report, a majority of SMBs based in US have experienced cyberattacks from past one year. Read on to know more... According...

How a GIF Image Sent through WhatsApp can Hack Your Android...

A malicious GIF image sent through WhatsApp could hack your Android phone. Read on to know more... Recently, Facebook-owned messaging app WhatsApp fixed a security...

Understanding the New Chameleon Spam Campaign

According to researchers, the new Chameleon spam campaign is known to often changes email templates. Read on to know more... According to researchers from Trustwave,...

NEWS

Toshiba Commerce Chooses Cybera as Preferred APAC SD-WAN Partner

Extends the Capabilities of Toshiba TCx Elevate Digital Commerce Platform to the Cloud Cybera has announced a new partnership with Toshiba, the global leader in...

Silent Librarian Threat Group Targets Universities in the US Via Phishing

Source: Cyware | By Ryan Stewart • Silent Librarian employs Freenom domains to host phishing landing pages. • The threat group also uses URL shorteners, linking,...

Google Patches 8 Vulnerabilities in Chrome 77

Source: SW | By Ionut Arghire Google this week announced an update for Chrome 77 that addresses 8 security vulnerabilities in the application, including 5...

Flaw fixed in HP’s controversial bloatware app

Source: IANS HP has issued a security advisory for its Touchpoint Analytics, which was said to be containing a security flaw that could let malware...

INTERVIEWS

Understanding The Function of World’s First AI Powered AST Solution

We recently met Mr. Oliver Moradov, Head of Partnerships at NeuraLegion, an Israeli headquartered company with a London office, which has recently innovated a...

Interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security

In an exclusive interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security at Cybertech Israel 2019, shares his view on IBM's implementation of...

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

INDUSTRY INPUTS

Safety Expertise in the Digital Age for Critical Infrastructures

As Industrial plants have become much more complex, we look at some of the critical requirements and safety expertise for critical infrastructures and Industrial...

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...

EVENTS

RSA Conference 2019 – Asia Pacific & Japan

RSA Conference 2019 Asia Pacific & Japan Marina Bay Sands | Singapore 16 – 18 July As the region's leading cybersecurity event, RSA Conference 2019 Asia Pacific...